VYPR

Lylme Spage

by Lylme

Source repositories

CVEs (6)

  • CVE-2024-36675Jun 4, 2024
    risk 0.04cvss epss 0.44

    LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.

  • CVE-2024-48176Nov 5, 2024
    risk 0.00cvss epss 0.00

    Lylme Spage v1.9.5 is vulnerable to Incorrect Access Control. There is no limit on the number of login attempts, and the verification code will not be refreshed after a failed login, which allows attackers to blast the username and password and log into the system backend.

  • CVE-2024-9790Oct 10, 2024
    risk 0.00cvss epss 0.00

    A vulnerability was found in LyLme_spage 1.9.5. It has been classified as critical. Affected is an unknown function of the file /admin/sou.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

  • CVE-2024-9789Oct 10, 2024
    risk 0.00cvss epss 0.00

    A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

  • CVE-2024-9788Oct 10, 2024
    risk 0.00cvss epss 0.00

    A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

  • CVE-2024-36674Jun 3, 2024
    risk 0.00cvss epss 0.00

    LyLme_spage v1.9.5 is vulnerable to Cross Site Scripting (XSS) via admin/link.php.